SlideShare a Scribd company logo
1 of 13
Download to read offline
The effects of using
ICT
By Odaly Fernandez
The effects of using ICT
 Software copyright
 Hacking
 Computer virus
     How   do you protect yourself?
Effects of ICT on employment
   Jobs lost
     Manufacturing
     Secretarial
                work
     Accounting clerks
     Newspaper printing
   Jobs gained
     ITtechnicians
     Computer programmers
     Web designers
     Help-desk staff
Effects of ICT on employment
    Questions:
    1.   State 2 areas in which employment has
         been increased and 2 in which
         unemployment has increased.
    2.   Explain 2 advantages why computers are
         used instead of people
    3.   Andrea thinks that ICT has a bad effect of
         employment. To what extent do you agree
         with this?
Effects of microprocessor-
controlled devices in the home
   What is a microprocesor?
     Small   CPU built into a single chip
   What is a microcontroller?
     Special type of microprocessor. In a chip
      contains: CPU, RAM, ROM, sometimes ADC,
      DAC to allow easy connection to devices such
      as sensors.
Effects of microprocessor-
controlled devices in the home
 Give examples of devices, which contain a
  microprocessor, and are used for
  entertainment
 Give examples of devices that make our
  lives easier.
Effects of microprocessor-
controlled devices in the home
    Questions
1.   There are many microprocessor-controlled
     devices in the modern house. Describe the
     effects of these devices on people’s lifestyles
     (with examples)
2.   Give 2 examples of microprocessor-controlled
     devices.
3.   Define microprocessor.
4.   What is a microcontroller?
Capabilities and limitations of ICT

 What are the capabilities of ICT?
 What are the limitations of ICT?
Internet use issues
   Phishing
Internet use issues
 Reliability of information
 How do you know which web pages to
  believe, which information to trust?
 Encryption
Internet use issues
 Pharming
 Spam
Potential health problems
 Research RSI (Repetitive Strain Injury)
 Describe other health problems related to
  the prolonged use of ICT.
Safety issues
 Overloading of electrical sockets
 Trailing wires
 Food and drink spillages.

More Related Content

What's hot

INTRODUCTION TO ICT
INTRODUCTION TO ICTINTRODUCTION TO ICT
INTRODUCTION TO ICTKak Yong
 
Chapter 2 Presentation
Chapter 2 PresentationChapter 2 Presentation
Chapter 2 PresentationAmy McMullin
 
Impact of ict on society
Impact of ict on societyImpact of ict on society
Impact of ict on societyAMOSOGAGAH
 
Chapter 3 storage media and devices
Chapter 3   storage media and devicesChapter 3   storage media and devices
Chapter 3 storage media and devicesPratik Gupta
 
Basic concepts in computer security
Basic concepts in computer securityBasic concepts in computer security
Basic concepts in computer securityArzath Areeff
 
Chapter 05 Digital Safety and Security
Chapter 05 Digital Safety and SecurityChapter 05 Digital Safety and Security
Chapter 05 Digital Safety and Securityxtin101
 
IGCSE ICT (0417) P3 Presentation Authoring
IGCSE ICT (0417) P3 Presentation AuthoringIGCSE ICT (0417) P3 Presentation Authoring
IGCSE ICT (0417) P3 Presentation AuthoringShamir George
 
Chapter 1-introduction-to-computers3165
Chapter 1-introduction-to-computers3165Chapter 1-introduction-to-computers3165
Chapter 1-introduction-to-computers3165ZOul Kapunk
 
Introduction to Computer Science
Introduction to Computer ScienceIntroduction to Computer Science
Introduction to Computer ScienceKalpit Jain
 
Computer Malware
Computer MalwareComputer Malware
Computer Malwareaztechtchr
 
Introduction to computer
Introduction to computerIntroduction to computer
Introduction to computerlina hajjar
 
Basic Computer Troubleshooting
Basic Computer TroubleshootingBasic Computer Troubleshooting
Basic Computer TroubleshootingMeredith Martin
 
Network management and security
Network management and securityNetwork management and security
Network management and securityAnkit Bhandari
 
Chapter 3 application software
Chapter 3   application softwareChapter 3   application software
Chapter 3 application softwarehaider ali
 
Introduction to computer hardware
Introduction to computer hardwareIntroduction to computer hardware
Introduction to computer hardwaremite6025.hku
 
Computer & internet Security
Computer & internet SecurityComputer & internet Security
Computer & internet SecurityGerard Lamusse
 
Network security
Network securityNetwork security
Network securityRaaz Karkee
 

What's hot (20)

Data Backup (IT) Lecture Slide # 5
Data Backup (IT) Lecture Slide # 5Data Backup (IT) Lecture Slide # 5
Data Backup (IT) Lecture Slide # 5
 
Computer maintenance
Computer maintenanceComputer maintenance
Computer maintenance
 
INTRODUCTION TO ICT
INTRODUCTION TO ICTINTRODUCTION TO ICT
INTRODUCTION TO ICT
 
5 pc maintenance
5 pc maintenance5 pc maintenance
5 pc maintenance
 
Chapter 2 Presentation
Chapter 2 PresentationChapter 2 Presentation
Chapter 2 Presentation
 
Impact of ict on society
Impact of ict on societyImpact of ict on society
Impact of ict on society
 
Chapter 3 storage media and devices
Chapter 3   storage media and devicesChapter 3   storage media and devices
Chapter 3 storage media and devices
 
Basic concepts in computer security
Basic concepts in computer securityBasic concepts in computer security
Basic concepts in computer security
 
Chapter 05 Digital Safety and Security
Chapter 05 Digital Safety and SecurityChapter 05 Digital Safety and Security
Chapter 05 Digital Safety and Security
 
IGCSE ICT (0417) P3 Presentation Authoring
IGCSE ICT (0417) P3 Presentation AuthoringIGCSE ICT (0417) P3 Presentation Authoring
IGCSE ICT (0417) P3 Presentation Authoring
 
Chapter 1-introduction-to-computers3165
Chapter 1-introduction-to-computers3165Chapter 1-introduction-to-computers3165
Chapter 1-introduction-to-computers3165
 
Introduction to Computer Science
Introduction to Computer ScienceIntroduction to Computer Science
Introduction to Computer Science
 
Computer Malware
Computer MalwareComputer Malware
Computer Malware
 
Introduction to computer
Introduction to computerIntroduction to computer
Introduction to computer
 
Basic Computer Troubleshooting
Basic Computer TroubleshootingBasic Computer Troubleshooting
Basic Computer Troubleshooting
 
Network management and security
Network management and securityNetwork management and security
Network management and security
 
Chapter 3 application software
Chapter 3   application softwareChapter 3   application software
Chapter 3 application software
 
Introduction to computer hardware
Introduction to computer hardwareIntroduction to computer hardware
Introduction to computer hardware
 
Computer & internet Security
Computer & internet SecurityComputer & internet Security
Computer & internet Security
 
Network security
Network securityNetwork security
Network security
 

Viewers also liked

Cambridge IGCSE ICT Revision Notes
Cambridge IGCSE ICT Revision Notes Cambridge IGCSE ICT Revision Notes
Cambridge IGCSE ICT Revision Notes Yash Bhatt
 
Chapter 4 computer networks
Chapter 4   computer networksChapter 4   computer networks
Chapter 4 computer networksPratik Gupta
 
IGCSE ICT 0417 P2 Document Production
IGCSE ICT 0417 P2 Document ProductionIGCSE ICT 0417 P2 Document Production
IGCSE ICT 0417 P2 Document ProductionShamir George
 
IGCSE ICT (0417) P2 data manipulation using Access
IGCSE ICT (0417) P2 data manipulation using AccessIGCSE ICT (0417) P2 data manipulation using Access
IGCSE ICT (0417) P2 data manipulation using AccessShamir George
 
The ways in which ict is used
The ways in which ict is usedThe ways in which ict is used
The ways in which ict is usedgracepm28
 
1.3 operating systems
1.3 operating systems1.3 operating systems
1.3 operating systemsDave Smith
 
6.12 expert systems
6.12 expert systems6.12 expert systems
6.12 expert systemsDave Smith
 
Social impact of ICT innovations
Social impact of ICT innovationsSocial impact of ICT innovations
Social impact of ICT innovationsCA
 
Chapter 7 the ways-in_which_is_ict_is_used[1]
Chapter 7   the ways-in_which_is_ict_is_used[1]Chapter 7   the ways-in_which_is_ict_is_used[1]
Chapter 7 the ways-in_which_is_ict_is_used[1]Pratik Gupta
 
Information Architecture System Design (IA)
Information Architecture System Design (IA)Information Architecture System Design (IA)
Information Architecture System Design (IA)Billy Choi
 
AS ICT (OCR) G061 3.1.1 Data, Information, Knowledge & Processing booklet
AS ICT (OCR) G061 3.1.1 Data, Information, Knowledge & Processing bookletAS ICT (OCR) G061 3.1.1 Data, Information, Knowledge & Processing booklet
AS ICT (OCR) G061 3.1.1 Data, Information, Knowledge & Processing bookletChristos Demetriou
 
Chapter 6 effects of ict on society
Chapter 6   effects of ict on societyChapter 6   effects of ict on society
Chapter 6 effects of ict on societyPratik Gupta
 
Chapter 8 system analysis and design
Chapter 8   system analysis and designChapter 8   system analysis and design
Chapter 8 system analysis and designPratik Gupta
 
Flue gas desulphurization detailed process
Flue gas desulphurization detailed processFlue gas desulphurization detailed process
Flue gas desulphurization detailed processmay021994
 

Viewers also liked (20)

IGCSE ICT
IGCSE ICTIGCSE ICT
IGCSE ICT
 
Cambridge IGCSE ICT Revision Notes
Cambridge IGCSE ICT Revision Notes Cambridge IGCSE ICT Revision Notes
Cambridge IGCSE ICT Revision Notes
 
iGCSE networks
iGCSE networksiGCSE networks
iGCSE networks
 
Chapter 4 computer networks
Chapter 4   computer networksChapter 4   computer networks
Chapter 4 computer networks
 
IGCSE ICT 0417 P2 Document Production
IGCSE ICT 0417 P2 Document ProductionIGCSE ICT 0417 P2 Document Production
IGCSE ICT 0417 P2 Document Production
 
IGCSE ICT (0417) P2 data manipulation using Access
IGCSE ICT (0417) P2 data manipulation using AccessIGCSE ICT (0417) P2 data manipulation using Access
IGCSE ICT (0417) P2 data manipulation using Access
 
The ways in which ict is used
The ways in which ict is usedThe ways in which ict is used
The ways in which ict is used
 
Igcse networks
Igcse networksIgcse networks
Igcse networks
 
1.3 operating systems
1.3 operating systems1.3 operating systems
1.3 operating systems
 
Sequencing
SequencingSequencing
Sequencing
 
6.12 expert systems
6.12 expert systems6.12 expert systems
6.12 expert systems
 
Social impact of ICT innovations
Social impact of ICT innovationsSocial impact of ICT innovations
Social impact of ICT innovations
 
Chapter 7 the ways-in_which_is_ict_is_used[1]
Chapter 7   the ways-in_which_is_ict_is_used[1]Chapter 7   the ways-in_which_is_ict_is_used[1]
Chapter 7 the ways-in_which_is_ict_is_used[1]
 
Information Architecture System Design (IA)
Information Architecture System Design (IA)Information Architecture System Design (IA)
Information Architecture System Design (IA)
 
AS ICT (OCR) G061 3.1.1 Data, Information, Knowledge & Processing booklet
AS ICT (OCR) G061 3.1.1 Data, Information, Knowledge & Processing bookletAS ICT (OCR) G061 3.1.1 Data, Information, Knowledge & Processing booklet
AS ICT (OCR) G061 3.1.1 Data, Information, Knowledge & Processing booklet
 
Chapter 6 effects of ict on society
Chapter 6   effects of ict on societyChapter 6   effects of ict on society
Chapter 6 effects of ict on society
 
Sequencing events
Sequencing eventsSequencing events
Sequencing events
 
Chapter 8 system analysis and design
Chapter 8   system analysis and designChapter 8   system analysis and design
Chapter 8 system analysis and design
 
Flue gas desulphurization detailed process
Flue gas desulphurization detailed processFlue gas desulphurization detailed process
Flue gas desulphurization detailed process
 
Why Study Consumer Behaviour
Why Study Consumer BehaviourWhy Study Consumer Behaviour
Why Study Consumer Behaviour
 

Similar to The effects of using ict

How to Avoid IoTageddon
How to Avoid IoTageddon How to Avoid IoTageddon
How to Avoid IoTageddon Bob Snyder
 
Chapter 1-introduction to ict
Chapter 1-introduction to ictChapter 1-introduction to ict
Chapter 1-introduction to ictAten Kecik
 
Why Home Computing is a Mess
Why Home Computing is a MessWhy Home Computing is a Mess
Why Home Computing is a Messschroedinger
 
Lesson 2.0 definition, importance, and advantages of computers
Lesson 2.0   definition, importance, and advantages of computersLesson 2.0   definition, importance, and advantages of computers
Lesson 2.0 definition, importance, and advantages of computersJoshua Hernandez
 
information system security notes for bat04015
information system security notes for bat04015information system security notes for bat04015
information system security notes for bat04015MUHAMADKASSIMMUHAMAD1
 
Tech nol-ogy stack
Tech nol-ogy stackTech nol-ogy stack
Tech nol-ogy stackLisa Stack
 
Computer ethics
Computer  ethicsComputer  ethics
Computer ethicsSKS
 
Itc lec 1 introduction to computer applications
Itc lec 1 introduction to computer applicationsItc lec 1 introduction to computer applications
Itc lec 1 introduction to computer applicationsAnzaDar3
 
Security in IoT
Security in IoTSecurity in IoT
Security in IoTSKS
 
A Comprehensive Exploration of Computer Systems Technology.docx
A Comprehensive Exploration of Computer Systems Technology.docxA Comprehensive Exploration of Computer Systems Technology.docx
A Comprehensive Exploration of Computer Systems Technology.docxgreendigital
 
Discovering Computer Chapter 1
Discovering Computer Chapter 1Discovering Computer Chapter 1
Discovering Computer Chapter 1MuhammedTalha7
 
A Study on Device Oriented Security Challenges in Internet of Things (IoT)
A Study on Device Oriented Security Challenges in Internet of Things (IoT)A Study on Device Oriented Security Challenges in Internet of Things (IoT)
A Study on Device Oriented Security Challenges in Internet of Things (IoT)Eswar Publications
 
Module_1_IT_ERA.pptx
Module_1_IT_ERA.pptxModule_1_IT_ERA.pptx
Module_1_IT_ERA.pptxJenloDiamse
 
Introduction to computer (Lerato Sekhoathane)
Introduction to computer (Lerato Sekhoathane)Introduction to computer (Lerato Sekhoathane)
Introduction to computer (Lerato Sekhoathane)Lerato100
 

Similar to The effects of using ict (20)

impact.pptx
impact.pptximpact.pptx
impact.pptx
 
Ict work and lifestyle
Ict work and lifestyleIct work and lifestyle
Ict work and lifestyle
 
Basic it
Basic itBasic it
Basic it
 
How to Avoid IoTageddon
How to Avoid IoTageddon How to Avoid IoTageddon
How to Avoid IoTageddon
 
Chapter 1-introduction to ict
Chapter 1-introduction to ictChapter 1-introduction to ict
Chapter 1-introduction to ict
 
azeem final iot report.docx
azeem final iot report.docxazeem final iot report.docx
azeem final iot report.docx
 
Why Home Computing is a Mess
Why Home Computing is a MessWhy Home Computing is a Mess
Why Home Computing is a Mess
 
Lesson 2.0 definition, importance, and advantages of computers
Lesson 2.0   definition, importance, and advantages of computersLesson 2.0   definition, importance, and advantages of computers
Lesson 2.0 definition, importance, and advantages of computers
 
information system security notes for bat04015
information system security notes for bat04015information system security notes for bat04015
information system security notes for bat04015
 
Tech nol-ogy stack
Tech nol-ogy stackTech nol-ogy stack
Tech nol-ogy stack
 
Beekman5 std ppt_17
Beekman5 std ppt_17Beekman5 std ppt_17
Beekman5 std ppt_17
 
Computer ethics
Computer  ethicsComputer  ethics
Computer ethics
 
Itc lec 1 introduction to computer applications
Itc lec 1 introduction to computer applicationsItc lec 1 introduction to computer applications
Itc lec 1 introduction to computer applications
 
Security in IoT
Security in IoTSecurity in IoT
Security in IoT
 
A Comprehensive Exploration of Computer Systems Technology.docx
A Comprehensive Exploration of Computer Systems Technology.docxA Comprehensive Exploration of Computer Systems Technology.docx
A Comprehensive Exploration of Computer Systems Technology.docx
 
Discovering Computer Chapter 1
Discovering Computer Chapter 1Discovering Computer Chapter 1
Discovering Computer Chapter 1
 
A Study on Device Oriented Security Challenges in Internet of Things (IoT)
A Study on Device Oriented Security Challenges in Internet of Things (IoT)A Study on Device Oriented Security Challenges in Internet of Things (IoT)
A Study on Device Oriented Security Challenges in Internet of Things (IoT)
 
Cyber security & Data Protection
Cyber security & Data ProtectionCyber security & Data Protection
Cyber security & Data Protection
 
Module_1_IT_ERA.pptx
Module_1_IT_ERA.pptxModule_1_IT_ERA.pptx
Module_1_IT_ERA.pptx
 
Introduction to computer (Lerato Sekhoathane)
Introduction to computer (Lerato Sekhoathane)Introduction to computer (Lerato Sekhoathane)
Introduction to computer (Lerato Sekhoathane)
 

More from odalyfer

Mind map and design
Mind map and designMind map and design
Mind map and designodalyfer
 
Mind map and design
Mind map and designMind map and design
Mind map and designodalyfer
 
Brief and gantt chart
Brief and gantt chartBrief and gantt chart
Brief and gantt chartodalyfer
 
The systems life cycle
The systems life cycleThe systems life cycle
The systems life cycleodalyfer
 

More from odalyfer (7)

Mind map and design
Mind map and designMind map and design
Mind map and design
 
Databases
DatabasesDatabases
Databases
 
Finances
FinancesFinances
Finances
 
Mind map and design
Mind map and designMind map and design
Mind map and design
 
Brief and gantt chart
Brief and gantt chartBrief and gantt chart
Brief and gantt chart
 
The systems life cycle
The systems life cycleThe systems life cycle
The systems life cycle
 
Databases
DatabasesDatabases
Databases
 

The effects of using ict

  • 1. The effects of using ICT By Odaly Fernandez
  • 2. The effects of using ICT  Software copyright  Hacking  Computer virus  How do you protect yourself?
  • 3. Effects of ICT on employment  Jobs lost  Manufacturing  Secretarial work  Accounting clerks  Newspaper printing  Jobs gained  ITtechnicians  Computer programmers  Web designers  Help-desk staff
  • 4. Effects of ICT on employment  Questions: 1. State 2 areas in which employment has been increased and 2 in which unemployment has increased. 2. Explain 2 advantages why computers are used instead of people 3. Andrea thinks that ICT has a bad effect of employment. To what extent do you agree with this?
  • 5. Effects of microprocessor- controlled devices in the home  What is a microprocesor?  Small CPU built into a single chip  What is a microcontroller?  Special type of microprocessor. In a chip contains: CPU, RAM, ROM, sometimes ADC, DAC to allow easy connection to devices such as sensors.
  • 6. Effects of microprocessor- controlled devices in the home  Give examples of devices, which contain a microprocessor, and are used for entertainment  Give examples of devices that make our lives easier.
  • 7. Effects of microprocessor- controlled devices in the home  Questions 1. There are many microprocessor-controlled devices in the modern house. Describe the effects of these devices on people’s lifestyles (with examples) 2. Give 2 examples of microprocessor-controlled devices. 3. Define microprocessor. 4. What is a microcontroller?
  • 8. Capabilities and limitations of ICT  What are the capabilities of ICT?  What are the limitations of ICT?
  • 10. Internet use issues  Reliability of information  How do you know which web pages to believe, which information to trust?  Encryption
  • 11. Internet use issues  Pharming  Spam
  • 12. Potential health problems  Research RSI (Repetitive Strain Injury)  Describe other health problems related to the prolonged use of ICT.
  • 13. Safety issues  Overloading of electrical sockets  Trailing wires  Food and drink spillages.